classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory


Protection from ransomware
February 2017, Cyber Security, IT infrastructure

If you’ve been listening to the news in the past few months, you have undoubtedly heard of a number of companies being affected by ransomware. The recent surge in this form of cyber attack has many organisations and users understandably concerned. And you should be too.

Ransomware is nasty stuff. However, with some careful preparation, you can significantly lower your risk of being infected, and reduce the impact on you or your organisation should you be hit.

Paul Williams, country manager – SADC at Fortinet.
Paul Williams, country manager – SADC at Fortinet.

Ransomware is a form of malware that infects devices, networks and data centres, encrypting critical files and prevents them from being used until the user or organisation pays a ransom to have the system unlocked. Ransomware has been around since at least 1989, when the ‘PC Cyborg’ trojan encrypted file names on a hard drive and insisted users pay $189 to have them unlocked. In the interim, ransomware attacks have become increasingly sophisticated, targeted, and lucrative.

The impact of ransomware is difficult to calculate, since many organisations opt to simply pay to have their files unlocked – an approach that doesn’t always work. However, a report on the Cryptowall v3 ransomware campaign, issued in October of 2015 by the Cyber Threat Alliance, estimated that the cost of that attack was US$ 325 million.

Ransomware generally works in one of several ways. Crypto Ransomware can infect an operating system so that a device is unable to boot. Other ransomware will encrypt a drive or a set of files or file names. Some malicious versions have a timer and begin deleting files until a ransom has been paid. All demand that a ransom be paid in order to unlock or release the blocked or encrypted system, files, or data.

What do I do to stop it?

Here are 10 things you need to do to protect yourself and your organisation from the effects of ransomware.

1. Develop a backup and recovery plan. Back up your systems regularly, and store that backup offline on a separate device.

2. Use professional email and web security tools that analyse email attachments, websites, and files for malware, and can block potentially compromised advertisements and social media sites that have no business relevance. These tools should include sandbox functionality, so that new or unrecognised files can be executed and analysed in a safe environment.

3. Keep your operating systems, devices, and software patched and updated.

4. Make sure that your device and network antivirus, IPS, and antimalware tools are running the latest updates.

5. Where possible, use application white listing, which prevents unauthorised applications from being downloaded or run.

6. Segment your network into security zones, so that an infection in one area cannot easily spread to another.

7. Establish and enforce permission and privilege, so that the fewest number of users have the potential to infect business-critical applications, data, or services.

8. Establish and enforce a BYOD security policy which can inspect and block devices which do not meet your standards for security (no client or anti-malware installed, antivirus files are out of date, operating systems need critical patches, etc.).

9. Deploy forensic analysis tools so that after an attack you can identify:

a) Where the infection came from,

b) How long it has been in your environment,

c) That you have removed all of it from every device, and

d) That you can ensure it doesn’t come back.

10. This is critical: Do not count on your employees to keep you safe. While it is still important to increase your user-awareness training so employees are taught to not download files, click on email attachments, or follow unsolicited web links in emails, human beings are the most vulnerable link in your security chain, and you need to plan around them.

Here’s why: For many of your employees, clicking on attachments and searching the Internet is part of their job. It is difficult to maintain the appropriate level of scepticism. Second, phishing attacks have become very convincing. A targeted phishing attack uses things like online data and social media profiles to customise an approach. Third, it is simply human nature to click on an unexpected invoice or critical message from your bank. And finally, in survey after survey, users feel that security is someone else’s job, not theirs.

What if I get infected?

I hope that you have a recent backup and you can wipe your device and reload it with an uninfected version. Here are some other things you need to do:

1. Report the crime.

2. Paying the ransom is no guarantee.

3. Contact experts.

4. Have a Plan B.


  Share via Twitter   Share via LinkedIn      

Further reading:

  • Driving surveillance storage
    July 2017, WD South Africa, Seagate Technology, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Storage for surveillance is a necessity, but the right components can make all the difference in the total cost of ownership and reliability of the solution.
  • Email is the weak link
    July 2017, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management
    Email remains any firm’s most important business tool and 43-trillion emails are sent annually The problem with email is that it was not designed to be secure.
  • A capsule of storage
    July 2017, This Week's Editor's Pick, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
    Capsule offers enterprise-class hyper-converged platforms designed specifically for the video surveillance market.
  • Biggest threat to industrial systems
    July 2017, This Week's Editor's Pick, Cyber Security, Security Services & Risk Management, Industrial (Industry)
    The biggest threat to industrial control systems since Stuxnet is Industroyer, a sophisticated and extremely dangerous malware designed to disrupt critical industrial processes.
  • Cybersecurity for access control
    July 2017, This Week's Editor's Pick, Access Control & Identity Management, Cyber Security, Asset Management, EAS, RFID
    Farpointe provides cybersecurity vulnerability checklist for contactless cards and readers.
  • Can you survive a cyber attack?
    July 2017, ContinuitySA, Cyber Security, Security Services & Risk Management
    The Cyber Resilience Framework provides a comprehensive, flexible structure to ensure organisations can survive cyber attacks.
  • Don’t ignore the mobile threat
    July 2017, Cyber Security
    50% of all mobile and tablet devices are not protected against cybercrime and malicious threats, that equates to about 40 million entry points into corporations and company networks.
  • Toshiba Mobile Zero Client
    July 2017, This Week's Editor's Pick, IT infrastructure
    A clientless solution that empowers staff to work on the move, while following all corporate security regulations.
  • USB to Fast Ethernet fibre adaptor
    July 2017, Products, IT infrastructure
    Use the Scorpion-USB Fast Ethernet Fibre Adapter to create an EMI-secure data connection between a USB port on a PC, laptop or tablet and a 100Mbps Ethernet fibre port on a switch.
  • Cybersecurity at the edge
    July 2017, ComNet , Products, IT infrastructure
    The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorised access is detected.
  • Storage for surveillance considerations
    July 2017, Milestone Systems, CCTV, Surveillance & Remote Monitoring, IT infrastructure
    Milestone Systems highlights three things to consider when you buy storage for video business systems.
  • Taking the pain out of maintenance
    June 2017, Integrated Solutions, IT infrastructure
    Technologies that allow for predictive and preventative maintenance are not available to the mass market inside the security industry, but Naxian is changing this with its smart services offering.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.